SlideShare a Scribd company logo
1 of 23
Sardar Patel Memorial Society’s (Trust)
RAJIV GANDHI COLLEGE OF ENGINEERING,
RESEARCH AND TECHNOLOGY, CHANDRAPUR
Department of Computer Science and Engineering
SEMESTER-V
SESSION-2021-22
A SEMINAR ON
CYBER SECURITY
Under the guidance of
Prof.Dr.Nitin Janwe
AND
SEMINAR IN-CHARGE
Prof. Madhavi Sadu
Presented By-
SHRUTIKA ATUL SAKARKAR[CSEB503]
CONTENTS:-
-Introduction
-What is cyber security?
-Types of cyber security
-Cyber attacks / Cyber crime
-Why do cyber attacks happen?
-Types of cyber attacks
-Hackers and attackers
-Types of hackers
-Why is cyber security important?
-Advantages and Disadvantages
-Cyber security tips
-Conclusion
-References
INTRODUCTION:-
-Cyber attacks are increasing day by day so to protect the system and data
from this attacks some cyber security measures are taken.
-The need of cyber security was felt when cyber attacks were increasing and
people were getting problem from it.
-The multinational companies and industries having a great amount of
possessive data, so there protection is important as well as the details of
clients and there contracts are very sensitive so that every company needs
cyber security.
-When the data is protected by means of technical security we can say it
cyber security.
WHAT IS CYBER SECURITY?
-Cyber security is the application of technologies, processes and controls
to protect systems, networks, programs, devices and data from cyber
attacks.
-It aims to reduce the risk of cyber attacks and protect against the
unauthorized exploitation of systems, networks and technologies.
-It is also known as information tech security or network information
security in common.
-The main purpose of cyber security is to protect all organizational assets
from both external and internal threats as well as disruptions caused due
to natural disasters.
TYPES OF CYBER SECURITY:-
• Network security
•Application security
•Information security
•Operational security
1]NETWORK SECURITY:-
-It is a set of rules and configurations designed to protect the
integrity, confidentiality and accessibility of computer networks and
data using both software and hardware technologies.
-It includes both hardware and software technologies.
-It targets a variety of threats.
-It stops them from entering or spreading on your network.
-Effective network security manages access to the network.
2]APPLICATION SECURITY:-
-Application security is the process of developing, adding, and
testing security features within applications to prevent security
vulnerabilities against threats such as unauthorized access and
modification.
-Much of this happens during the development phase, but it
includes tools and methods to protect apps once they are
deployed.
-This is becoming more important as hackers increasingly target
applications with their attacks.
3]INFORMATION SECURITY:-
-Information Security is basically the practice of preventing
unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of information.
-The goal is to ensure the safety and privacy of critical data such as
customer account details, financial data or intellectual property.
-Ensures that only authorized users (confidentiality) have access to
accurate and complete information (integrity) when required
(availability).
4]OPERATIONAL SECURITY:-
-Operational security (OPSEC) is a security and risk management
process that prevents sensitive information from getting into the
wrong hands.
-Things that fall under the OPSEC umbrella include monitoring
behaviors and habits on social media sites as well as discouraging
employees from sharing login credentials via email or text message.
-Operational security forces managers to dive deeply into their
operations and figure out where their information can be easily
breached.
CYBER ATTACKS/CYBER CRIME:-
-A cyber attack is an attempt to disable computers, steal data, or use
a breached computer system to launch additional attacks.
-It aims to disable, disrupt, destroy or control computer systems or
to alter, block, delete, manipulate or steal the data held within these
systems.
-It can be launched from anywhere by any individual or group using
one or more various attack strategies.
WHY DO CYBER ATTACKS HAPPEN?
Cyber attacks are designed to cause damage. They can
have various objectives, including the following:
1]Financial gain
2]Disruption and revenge
3]Cyber warfare
TYPES OF CYBER ATTACKS:-
TYPES OF CYBER ATTACKS:-
1. Injection attacks- It is the attack in which some data will be injected into a web
application to manipulate the application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing- DNS Spoofing is a type of computer security hacking. Whereby a
data is introduced into a DNS resolver's cache causing the name server to return an
incorrect IP address, diverting traffic to the attackers computer or any other
computer. The DNS spoofing attacks can go on for a long period of time without
being detected and can cause serious security issues.
3. Session Hijacking- It is a security attack on a user session over a protected
network. Web applications create cookies to store the state and user sessions. By
stealing the cookies, an attacker can have access to all of the user data.
4. Phishing- Phishing is a type of attack which attempts to steal sensitive
information like user login credentials and credit card number. It occurs when an
attacker is masquerading as a trustworthy entity in electronic communication.
5. Brute force-It is a type of attack which uses a trial and error method. This attack
generates a large number of guesses and validates them to obtain actual data like
user password and personal identification number. This attack may be used by
criminals to crack encrypted data, or by security, analysts to test an organization's
network security.
6. Denial of Service- It is an attack which meant to make a server or network
resource unavailable to the users. It accomplishes this by flooding the target with
traffic or sending it information that triggers a crash. It uses the single system and
single internet connection to attack a server.
7. Dictionary attacks- This type of attack stored the list of a commonly used
password and validated them to get original password.
8. URL Interpretation- It is a type of attack where we can change the certain parts
of a URL, and one can make a web server to deliver web pages for which he is not
authorized to browse.
9. File Inclusion attacks- It is a type of attack that allows an attacker to access
unauthorized or essential files which is available on the web server or to execute
malicious files on the web server by making use of the include functionality.
10. Man in the middle attacks- It is a type of attack that allows an attacker to
intercepts the connection between client and server and acts as a bridge between
them. Due to this, an attacker will be able to read, insert and modify the data in the
intercepted connection.
Hackers and attackers:-
“Hacker” is another name for an ethical researcher. It refers to someone who
proactively explores, identifies and alerts organizations to vulnerabilities that an
attacker could use for malicious purposes. They seek to disclose in good faith by
alerting organizations that may or may not have vulnerability disclosure policies.
An “attacker,” on the other hand, is just that. It’s someone who gains
unauthorized access to someone else’s network and computers for malicious
purposes. An attacker probes for vulnerabilities, but unlike a hacker, the attacker
exploits them without permission or without warning the organization
TYPES OF HACKERS:-
1. Black Hat Hacker-
Black-hat Hackers are also known as an Unethical Hacker or
a Security Cracker. These people hack the system illegally to
steal money or to achieve their own illegal goals.
2. White Hat Hacker-
White hat Hackers are also known as Ethical Hackers or a
Penetration Tester. White hat hackers are the good guys of
the hacker world.
3. Gray Hat Hacker-
Gray hat Hackers are Hybrid between Black hat Hackers and
White hat hackers. They can hack any system even if they
don't have permission to test the security of the system but
they will never steal money or damage the system.
WHY IS CYBER SECURITY IMPORTANT:-
-The importance of cyber security comes down with the desire to keep information,
data, and devices private and safe. In today’s world, people store vast quantities
of data on computers and other internet-connected devices.
- By implementing security, businesses and individuals can protect themselves
against the full range of cyber security threats outlined below, as well as the
numerous others that exist.
-In the case of public services or governmental organizations, cyber security
helps ensure that the community can continue to rely on their services.
-With cyber security, companies do not have to worry about unauthorized users
accessing their network or data. It helps them protect both their end users and
their employees.
ADVANTAGES AND DISADVANTAGES OF CYBER
SECURITY:-
Advantages:-
• Protects system against
viruses, worms, spyware and
other unwanted programs.
• Protection against data from
theft.
• Protects the computer from
being hacked.
• Minimizes computer freezing
and crashes.
• Gives privacy to users
Disadvantages:-
• Firewalls can be difficult to
configure correctly.
• Incorrectly configured firewalls
may block users from performing
certain actions on the Internet,
until the firewall configured
correctly.
• Makes the system slower than
before.
• Need to keep updating the new
software in order to keep security
up to date.
• Could be costly for average user.
CYBER SECURITY TIPS:-
• Install a firewall
• Set up an Access Control List
• Change the default passwords for the company's point of sale
system
• Establish security roles and responsibilities
• Establish policies for Internet and social media usage
• Use a Web-filtering system
• Use Internet security programs on each computer
• Be aware of peer-to-peer sites
• Keep the most critical data offline
• Get cybercrime insurance
CONCLUSION:-
- Cyber security was introduced to reduce cyber crimes.
- This crimes will affect the loss of revenue , waste of
valuable time , damage reputation and reduce
productivity.
- As an IT user , we should have to be aware of some of
the cyber laws in the country.
- Hopefully, we can be more careful and never involve in
any cyber crime.
REFERENCES:-
www.javatpoint.com
www.studyMaria.org
www.techtarget.com
www.logpoint.com
THANK
YOU!!

More Related Content

What's hot (20)

cyber security
cyber security cyber security
cyber security
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Network security
Network securityNetwork security
Network security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network Security Network Security
Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Awareness
Information Security AwarenessInformation Security Awareness
Information Security Awareness
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to SEMINAR ON CYBER SECURITY.pptx

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptwaleejhaider1
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET Journal
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 

Similar to SEMINAR ON CYBER SECURITY.pptx (20)

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different Types
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 

Recently uploaded

The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)thephillipta
 
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...anilsa9823
 
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...akbard9823
 
FULL ENJOY - 9953040155 Call Girls in Sangam Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Sangam Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Sangam Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Sangam Vihar | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in Indirapuram | Delhi
FULL ENJOY - 9953040155 Call Girls in Indirapuram | DelhiFULL ENJOY - 9953040155 Call Girls in Indirapuram | Delhi
FULL ENJOY - 9953040155 Call Girls in Indirapuram | DelhiMalviyaNagarCallGirl
 
Akola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service AkolaAkola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service Akolasrsj9000
 
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...akbard9823
 
FULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | DelhiFULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | DelhiMalviyaNagarCallGirl
 
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiMalviyaNagarCallGirl
 
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Servicesonnydelhi1992
 
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service HisarVip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisarsrsj9000
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...akbard9823
 
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...wdefrd
 
Alex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson StoryboardAlex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson Storyboardthephillipta
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | Noida
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | NoidaFULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | Noida
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | Noidasoniya singh
 
FULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | DelhiFULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | DelhiMalviyaNagarCallGirl
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | Delhisoniya singh
 
Jeremy Casson - An Architectural and Historical Journey Around Europe
Jeremy Casson - An Architectural and Historical Journey Around EuropeJeremy Casson - An Architectural and Historical Journey Around Europe
Jeremy Casson - An Architectural and Historical Journey Around EuropeJeremy Casson
 

Recently uploaded (20)

The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)The First Date by Daniel Johnson (Inspired By True Events)
The First Date by Daniel Johnson (Inspired By True Events)
 
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Lajpat Nagar Delhi >༒9667401043 Escort Service
 
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
Lucknow 💋 Cheap Call Girls In Lucknow Finest Escorts Service 8923113531 Avail...
 
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
Indira Nagar Lucknow #Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payme...
 
FULL ENJOY - 9953040155 Call Girls in Sangam Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Sangam Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Sangam Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Sangam Vihar | Delhi
 
FULL ENJOY - 9953040155 Call Girls in Indirapuram | Delhi
FULL ENJOY - 9953040155 Call Girls in Indirapuram | DelhiFULL ENJOY - 9953040155 Call Girls in Indirapuram | Delhi
FULL ENJOY - 9953040155 Call Girls in Indirapuram | Delhi
 
Akola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service AkolaAkola Call Girls #9907093804 Contact Number Escorts Service Akola
Akola Call Girls #9907093804 Contact Number Escorts Service Akola
 
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
Hazratganj / Call Girl in Lucknow - Phone 🫗 8923113531 ☛ Escorts Service at 6...
 
FULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | DelhiFULL ENJOY - 9953040155 Call Girls in Burari | Delhi
FULL ENJOY - 9953040155 Call Girls in Burari | Delhi
 
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Uttam Nagar | Delhi
 
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort ServiceYoung⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
Young⚡Call Girls in Uttam Nagar Delhi >༒9667401043 Escort Service
 
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service HisarVip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
Vip Hisar Call Girls #9907093804 Contact Number Escorts Service Hisar
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
 
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
 
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
Islamabad Escorts # 03080115551 # Escorts in Islamabad || Call Girls in Islam...
 
Alex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson StoryboardAlex and Chloe by Daniel Johnson Storyboard
Alex and Chloe by Daniel Johnson Storyboard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | Noida
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | NoidaFULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | Noida
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Pari Chowk | Noida
 
FULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | DelhiFULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
FULL ENJOY - 9953040155 Call Girls in Shahdara | Delhi
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Vasant Kunj | Delhi
 
Jeremy Casson - An Architectural and Historical Journey Around Europe
Jeremy Casson - An Architectural and Historical Journey Around EuropeJeremy Casson - An Architectural and Historical Journey Around Europe
Jeremy Casson - An Architectural and Historical Journey Around Europe
 

SEMINAR ON CYBER SECURITY.pptx

  • 1. Sardar Patel Memorial Society’s (Trust) RAJIV GANDHI COLLEGE OF ENGINEERING, RESEARCH AND TECHNOLOGY, CHANDRAPUR Department of Computer Science and Engineering SEMESTER-V SESSION-2021-22 A SEMINAR ON CYBER SECURITY Under the guidance of Prof.Dr.Nitin Janwe AND SEMINAR IN-CHARGE Prof. Madhavi Sadu Presented By- SHRUTIKA ATUL SAKARKAR[CSEB503]
  • 2. CONTENTS:- -Introduction -What is cyber security? -Types of cyber security -Cyber attacks / Cyber crime -Why do cyber attacks happen? -Types of cyber attacks -Hackers and attackers -Types of hackers -Why is cyber security important? -Advantages and Disadvantages -Cyber security tips -Conclusion -References
  • 3. INTRODUCTION:- -Cyber attacks are increasing day by day so to protect the system and data from this attacks some cyber security measures are taken. -The need of cyber security was felt when cyber attacks were increasing and people were getting problem from it. -The multinational companies and industries having a great amount of possessive data, so there protection is important as well as the details of clients and there contracts are very sensitive so that every company needs cyber security. -When the data is protected by means of technical security we can say it cyber security.
  • 4. WHAT IS CYBER SECURITY? -Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. -It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies. -It is also known as information tech security or network information security in common. -The main purpose of cyber security is to protect all organizational assets from both external and internal threats as well as disruptions caused due to natural disasters.
  • 5. TYPES OF CYBER SECURITY:- • Network security •Application security •Information security •Operational security
  • 6. 1]NETWORK SECURITY:- -It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. -It includes both hardware and software technologies. -It targets a variety of threats. -It stops them from entering or spreading on your network. -Effective network security manages access to the network.
  • 7. 2]APPLICATION SECURITY:- -Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. -Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. -This is becoming more important as hackers increasingly target applications with their attacks.
  • 8. 3]INFORMATION SECURITY:- -Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. -The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property. -Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability).
  • 9. 4]OPERATIONAL SECURITY:- -Operational security (OPSEC) is a security and risk management process that prevents sensitive information from getting into the wrong hands. -Things that fall under the OPSEC umbrella include monitoring behaviors and habits on social media sites as well as discouraging employees from sharing login credentials via email or text message. -Operational security forces managers to dive deeply into their operations and figure out where their information can be easily breached.
  • 10. CYBER ATTACKS/CYBER CRIME:- -A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. -It aims to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. -It can be launched from anywhere by any individual or group using one or more various attack strategies.
  • 11. WHY DO CYBER ATTACKS HAPPEN? Cyber attacks are designed to cause damage. They can have various objectives, including the following: 1]Financial gain 2]Disruption and revenge 3]Cyber warfare
  • 12. TYPES OF CYBER ATTACKS:-
  • 13. TYPES OF CYBER ATTACKS:- 1. Injection attacks- It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information. Example- SQL Injection, code Injection, log Injection, XML Injection etc. 2. DNS Spoofing- DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues. 3. Session Hijacking- It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data. 4. Phishing- Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.
  • 14. 5. Brute force-It is a type of attack which uses a trial and error method. This attack generates a large number of guesses and validates them to obtain actual data like user password and personal identification number. This attack may be used by criminals to crack encrypted data, or by security, analysts to test an organization's network security. 6. Denial of Service- It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server. 7. Dictionary attacks- This type of attack stored the list of a commonly used password and validated them to get original password. 8. URL Interpretation- It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web pages for which he is not authorized to browse.
  • 15. 9. File Inclusion attacks- It is a type of attack that allows an attacker to access unauthorized or essential files which is available on the web server or to execute malicious files on the web server by making use of the include functionality. 10. Man in the middle attacks- It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.
  • 16. Hackers and attackers:- “Hacker” is another name for an ethical researcher. It refers to someone who proactively explores, identifies and alerts organizations to vulnerabilities that an attacker could use for malicious purposes. They seek to disclose in good faith by alerting organizations that may or may not have vulnerability disclosure policies. An “attacker,” on the other hand, is just that. It’s someone who gains unauthorized access to someone else’s network and computers for malicious purposes. An attacker probes for vulnerabilities, but unlike a hacker, the attacker exploits them without permission or without warning the organization
  • 17. TYPES OF HACKERS:- 1. Black Hat Hacker- Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. 2. White Hat Hacker- White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. 3. Gray Hat Hacker- Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system.
  • 18. WHY IS CYBER SECURITY IMPORTANT:- -The importance of cyber security comes down with the desire to keep information, data, and devices private and safe. In today’s world, people store vast quantities of data on computers and other internet-connected devices. - By implementing security, businesses and individuals can protect themselves against the full range of cyber security threats outlined below, as well as the numerous others that exist. -In the case of public services or governmental organizations, cyber security helps ensure that the community can continue to rely on their services. -With cyber security, companies do not have to worry about unauthorized users accessing their network or data. It helps them protect both their end users and their employees.
  • 19. ADVANTAGES AND DISADVANTAGES OF CYBER SECURITY:- Advantages:- • Protects system against viruses, worms, spyware and other unwanted programs. • Protection against data from theft. • Protects the computer from being hacked. • Minimizes computer freezing and crashes. • Gives privacy to users Disadvantages:- • Firewalls can be difficult to configure correctly. • Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly. • Makes the system slower than before. • Need to keep updating the new software in order to keep security up to date. • Could be costly for average user.
  • 20. CYBER SECURITY TIPS:- • Install a firewall • Set up an Access Control List • Change the default passwords for the company's point of sale system • Establish security roles and responsibilities • Establish policies for Internet and social media usage • Use a Web-filtering system • Use Internet security programs on each computer • Be aware of peer-to-peer sites • Keep the most critical data offline • Get cybercrime insurance
  • 21. CONCLUSION:- - Cyber security was introduced to reduce cyber crimes. - This crimes will affect the loss of revenue , waste of valuable time , damage reputation and reduce productivity. - As an IT user , we should have to be aware of some of the cyber laws in the country. - Hopefully, we can be more careful and never involve in any cyber crime.